Cloak Phone: Blackout Mobile’s John McAfee-Backed Blockchain Luxury Privacy Smartphone Launches
Privacy Backed, Cloak Phone Launched by John McAfee's Team
John McAfee, the crypto-crazed supporter and entrepreneur, took to Twitter to announce early access applications are available for his new Cloak Phone, described as “the ultimate private smart phone.” Find out how it works today in our review.
What is the Cloak Phone?
The Cloak Phone is an upcoming smartphone in development by Blackout Mobile and Team McAfee. The phone aims to provide “the luxury of privacy” to users by creating “the ultimate private smart phone.”
“Very proud of my colleagues at Blackout Mobile and Team McAfee”. The world has officially become one step closer of having “The Luxury Of Privacy”. The Cloak Phone has officially arrived – Based on my original design for the ultimate private smart phone.https://t.co/xgOFAy5FOb
— John McAfee (@officialmcafee) July 31, 2018
You can sign up for the Cloak Phone’s early access online today at CloakPhone.com. However, the phone isn’t scheduled to launch until Q2 2019. The website is filled with digital mock-ups of the device, so it doesn’t appear that a real-world prototype has been made.
The goal of the Cloak Phone is to allow users to use a smartphone without divulging intimate personal details with every tap. The website explains that existing smartphones, apps, and cell providers compromise our privacy and personal safety. Simply by using your smartphone, you’re giving away your name, address, phone number, date of birth, fingerprints, social security number, credit card numbers, bank account logins, cryptocurrency account logins, passwords, photos, emails, texts, contacts, browsing history, and location history.
Some of this data is available instantly to your carrier and mobile device operator. Other data can easily be discovered with a warrant.
Among other core features, the Cloak Phone uses blockchain technology to enhance device security.
How Does Cloak Phone Work?
Cloak Phone is powered by an operating system called Fortress OS. That operating system has native security features designed to make it the more secure mobile operating system in the world.
Some of the built-in features include a baseband firewall, for example, and a verified secure boot. Together, these features prevent unauthorized applications from launching while also blocking incursion attempts like Stingray attacks and eavesdropping.
Additionally, all calls and texts are encrypted end-to-end over the device. The Cloak Phone also claims to offer zero-day vulnerability defenses and full disk encryption.
Interestingly, the Cloak Phone is also compliant with the GDPR, the new data storage requirements from the European Union. The GDPR requires all personal data to:
“be processed in a manner that ensures appropriate security of the personal data, including protection against unauthorized or unlawful processing and against accidental loss, destruction or damage, using appropriate technical or organizational measures.”
The entire Fortress OS and Cloak Phone ecosystem is built on blockchain technology. Specifically, the Cloak Phone uses Ethereum Casper. The network uses zero-transaction cost coins and blockchain-based license management to enhance security on the device.
Cloak Phone Features
The Cloak Phone emphasizes greatly on privacy and uses the Fortress Operating System to achieve this. Users are provided with a wide range of features have the ability to verify secure boot, the integration of the encryption AES256, efficient data handling, eliminate one’s phone from being entered into and eavesdropped and to ensure that harmful data have been blocked altogether.
Some of the core features of Fortress OS include:
Baseband Firewall: The Cloak Phone protects from eavesdropping and Stingray attacks using its baseband firewall. These are popular strategies used by law enforcement officers to snoop on unsuspecting smartphone users.
Verified Secure Boot: Fortress OS has a secure boot feature that prevents unauthorized applications from launching during the boot process.
Multi-layered Security: Fortress OS has multi-layered security, including “zero-day vulnerability and incursion defenses.” Fortress OS also has data handling and remote wipe, among other features.
Full Disk Encryption: Fortress OS offers full disk encryption using AES-256.
Privacy: Fortress OS provides additional privacy by preventing advertisements from tracking and protecting your meta-data.
End-to-End Call and Text Encryption: The Cloak Phone and Fortress OS encrypts calls and texts end-to-end.
GDPR Compliant: Another unique feature of the Cloak Phone is that it’s compliant with the General Data Protection Regulation, or GDPR. The GDPR requires all personal data to be processed in a secure way, and the Cloak Phone complies with this requirement.
Ultimately, the information listed above is all we know about the Cloak Phone. The CloakPhone.com website features a single page of information. Obviously, we’re still nearly a year away from the release of the Cloak Phone, so we expect more details – like tech specs – to emerge over the coming months.
Who’s Behind the Cloak Phone?
John McAfee’s name has been attached to the Cloak Phone since launch. However, McAfee and his team didn’t directly manufacture the phone. Instead, the phone is a product of Blackout Mobile. The CloakPhone.com homepage claims the device was “inspired by John McAfee”. Additionally, the page lists affiliations with the McAfee Crypto Team, Kitely Tech, and BrandFire.
The main Cloak Phone office is located in Jericho, New York.
With more and more businesses turning to mobile devices to conduct confidential exchanges, the necessity for increased security and privacy automatically forms. To see that the Cloak Phone has targeted common problems with using a mobile device is reassuring..
Ultimately, the Cloak Phone is being marketed to enterprises and end users concerned about privacy. Enterprises can benefit from the device by enhancing office security. They no longer have to be concerned about employees connecting compromised devices to the network.
At the same time, end users focused on security can enjoy end-to-end security, full disk encryption, and other valuable features.
Right now, early access applications are available online at CloakPhone.com. However, the phone isn’t scheduled to launch until Q2 2019.
Here's a look at some of the reactions on Twitter:
Looks quite promising John. Thanks to you, your team and the guys at https://t.co/ZsaqsSm5Ey privacy protection looks closer than ever. Less than a year to launch…
— Srini (@srinigoes) July 31, 2018
It's a brand new concept, from the top down.
— John McAfee (@officialmcafee) July 31, 2018
Specs? Camera quality, chip, ram
— Tim Bohanon (@TimmayFL) July 31, 2018
Congratulations.! Are #encrypted calls & sms over cellular network going to be there in #CloakPhone offering with its launch or in near future? may give a solid reason to many to have one of this. #Privacy #EFF
— whitehatGuru (@whitehatGuru) July 31, 2018
Does it allow us to generate our own key for the encrypted messaging, calls etc?
— Sean (@SeanG294) July 31, 2018